Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uniform Co-Scheduling Using Object-Oriented Design Techniques., and . Decentralized and Distributed Systems, volume A-39 of IFIP Transactions, page 317-328. North-Holland, (1993)JVer: A Java Verifier., , , , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 144-147. Springer, (2005)Dynamic Partitioning in Different Distributed-Memory Environments., , and . JSSPP, volume 1162 of Lecture Notes in Computer Science, page 244-270. Springer, (1996)On-Device Mobile Phone Security Exploits Machine Learning., , and . IEEE Pervasive Comput., 16 (2): 92-96 (2017)From Smart to Autonomous Phones.. IEEE Pervasive Comput., 3 (3): 102-104 (2004)Smartphones: Past, Present, and Future., and . IEEE Pervasive Comput., 13 (4): 89-92 (2014)A Flexible Security System for Using Internet Content., , , and . IEEE Softw., 14 (5): 52-59 (1997)JavaScript instrumentation for browser security., , , and . POPL, page 237-249. ACM, (2007)AOE: A Mobile Operating Environment for Web-Based Applications., , , , and . SAINT, page 15-24. IEEE Computer Society, (2004)Designing and Implementing Choices: An Object-Oriented System in C++., , , and . Commun. ACM, 36 (9): 117-126 (1993)